A Different Cybersecurity Training
Should all cybersecurity training options be aimed at users, technical staff or large companies?

A Different Cybersecurity Training

A quick survey of Cybersecurity education options recently got me thinking about about InfoSec education for busy Managers and Executives. Are we leaving out the real-world SMB managers and executives? Are we missing something?

I think it's like when computers were first introduced. I graduated college with a Computer Science degree and people would say "I hear you work with computers". But by the 1990's personal computers were being used everywhere and the distinction became "I am a programmer" or "I work for a computer manufacturer" or "I train users" and so on.  

It's the same way now with Information Security, and Cybersecurity Training specifically. Of course there is SAT (awareness training) that everyone in a company needs. It focuses on things like password management, cyber hygiene, phishing, physical access, good habits, etc. Very worthwhile.

And then there is more technical InfoSec training for security professionals that leads to industry-recognized certifications like Security+, CISSP, and CEH. More detailed, more concrete, than executive-level training.

And now more recently, security topics and processes that are really management-oriented have been organized into "Management Training" or "Executive Training". Is there a bias toward big corporations?


No alt text provided for this image
An example from Flex-Protection.com of a simple tool for small to medium businesses


Last year I attained a CISM (Certified Information Security Manager) certification. Its focus is more on governance, planning, organization, documentation, processes, approvals, and data security concepts. It was very broad, but it essentially focuses on the question "Can you create and manage an enterprise data security program?". 

I was kicking around some ideas with a UK professional education company last year, and I took a look at a course they offered "for the boardroom". It was a special in-person course for executives (and those with a generous big-company budget!).  I read through their syllabus, and it was basically identical to the CISM outline and prep materials. They were really just copying what was already out there, in its totality rather than as a starting point. And it was a very short course that ran only one day. By my count, it covered seventeen topics in one day.

Last year a UK university asked me to create and present a 15-minute introduction to Cyber Security. 15 minutes! I still have the four-page write-up I created, and I occasionally share it with people, but you can't really do much when you don't allocate enough time.  It's not really a great overview.

Let's think outside the box for a moment. What could we (InfoSec professionals) be offering as far as training for managers and executives at small-to-medium companies? Can we help reduce the changes of a successful cyber attack or data breach?

If I was tasked with creating an up-to-date executive-level Information Security course, targeted at companies of ALL sizes, I would take the following approach:

1. Start with the CISM outline and information, which has good content and useful documents like a Charter, an ISP (Information Security Policy) , an Asset Inventory, and several others.

2. Ask "what can we reasonably remove from the CISM outline in the name of brevity"?

3. Ask "What can we add to the course from SAT (user training) that makes sense for executives"?

4. Ask "What can we add from the Security+ and CEH outlines that fits our mission and is not too technical"?

5. Add some ideas targeted at small and medium organizations and businesses. In my opinion, this is something that is lacking in CISM. 

6. Add a section at the end of the course entitled "What you can do right now". What are the 5 (or 10) steps the execs can take immediately to start reducing their risk of ransomware, destructive attacks and data breaches. Yes, this is the "low hanging fruit". This take-away is the most important part of the course, in my mind. 

And I would put most or all of the course online to increase access. (OK, I am biased toward online education because I am in that business - learning technology. But it could be done in person as well.)


Scott Cochran is a strategist and solution developer, with additional information and free downloads available at www.flex-protection.com

Ed Bott

Information Security for Companies of All Sizes

1y

I guess the big budgets are with big companies. But the need is there for smaller organizations too.

Like
Reply

To view or add a comment, sign in

More articles by Scott Cochran MBA CEH CSIM

  • A Dark Place In The USA

    A Dark Place In The USA

    Everyone knows that it’s foolish to even mention politics in the workplace, although it certainly happens all the time.…

  • Bad Security

    Bad Security

    Poor Data Security Via 2FA and Lying to Their Customers Many companies have jumped on the two-factor-authentication…

  • How Small Projects Lead To Big Projects

    How Small Projects Lead To Big Projects

    Years ago I was a Project Manager for a large software company, much bigger than the small company I manage today. We…

  • What is ISO 27001 All About?

    What is ISO 27001 All About?

    Bullet-point Briefing: ISO 27001 The following very-simplified briefing will not make you an expert on the ISO 27001…

  • Do You Really Need A Formal Information Security Policy?

    Do You Really Need A Formal Information Security Policy?

    Most small companies can still remember when they first launched, and they had to put together a formal Business Plan…

  • Planning For A Little Failure

    Planning For A Little Failure

    Ransomware attacks are back in the news, as big-time hackers are successfully attacking big companies and national…

  • Cybersecurity Business and Cyber War

    Cybersecurity Business and Cyber War

    The world of information security, data breaches, and cyber attacks is still growing, both in the variety of threats…

  • Give Me One Security Measure

    Give Me One Security Measure

    Last week I was chatting with a manager at a small company about information security and the dangers we all face. She…

  • Better Password Management

    Better Password Management

    By now you are probably familiar with one of the greatest risk areas in Information Security. It's Password Management,…

  • Why Instructional Designers STILL Love PowerPoint

    Why Instructional Designers STILL Love PowerPoint

    Yes I know - there are many sophisticated and expensive course authoring tools available. Some of them can make some…

Insights from the community

Others also viewed

Explore topics